Generate MD5, SHA-1, SHA-256, SHA-384, and SHA-512 hashes. Everything runs locally - no data is sent to any server.
SHA-256, SHA-384, and SHA-512 are cryptographically secure and recommended for integrity verification and security applications.
MD5 and SHA-1 are considered broken for security purposes. Only use them for checksums or legacy compatibility.